mandatoryprogrammer / CursedChromeLinks
Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.
☆1,574Updated 8 months ago
Alternatives and similar repositories for CursedChrome
Users that are interested in CursedChrome are comparing it to the libraries listed below
Sorting:
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆627Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,103Updated 3 years ago
- A DNS rebinding attack framework.☆1,114Updated 3 weeks ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,415Updated 5 months ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,513Updated last year
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,373Updated 4 years ago
- Subdomain Takeover tool written in Go☆1,981Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,240Updated 8 months ago
- Mass scan IPs for vulnerable services☆1,036Updated 3 years ago
- IP lookup by favicon using Shodan☆1,173Updated 4 months ago
- A Tool for Domain Flyovers☆5,783Updated 3 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,222Updated 4 months ago
- A python script that finds endpoints in JavaScript files☆3,988Updated last year
- File upload vulnerability scanner and exploitation tool.☆3,215Updated last month
- A curated list of amazingly awesome Burp Extensions☆3,212Updated 4 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,778Updated 2 years ago
- Reverse proxies cheatsheet☆1,822Updated last year
- pwning IPv4 via IPv6☆1,812Updated last year
- Awesome cloud enumerator☆1,018Updated 3 months ago
- Convolutional neural network for analyzing pentest screenshots☆1,217Updated last year
- A mostly-serverless distributed hash cracking platform☆809Updated last year
- Fetch all the URLs that the Wayback Machine knows about for a domain☆3,975Updated last year
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆988Updated 7 months ago
- The Swiss Army knife for automated Web Application Testing☆2,256Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,868Updated 2 years ago
- Making Favicon.ico based Recon Great again !☆1,208Updated last year
- GitHub recon tool leveraging Code Search API. Scans for exposed API keys across all of GitHub, not just known repos and orgs. Support for…☆1,316Updated this week
- ⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.☆805Updated last month
- HTTP parameter discovery suite.☆5,699Updated 4 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,338Updated 8 months ago